Common use of Technical Controls Clause in Contracts

Technical Controls. 5.1 The Applicant Institution shall implement appropriate end point security, including firewall, anti-virus, anti-spyware and other anti-malware software and technologies on all laptops, desktops and servers it uses to process the Materials. 5.2 The Applicant Institution shall update its firewall, anti-virus, anti-spyware and other anti-malware software and technologies on a regular basis to ensure that they protect against then-current virus, spyware and other malware threats. 5.3 The Applicant Institution shall ensure that updates and patches of critical software and firmware are applied within a reasonably prompt time period. 5.4 The Applicant Institution shall mitigate external attacks using a number of methods, including the use of Intrusion Prevention and Detection Systems (IPS/IDS) in addition to firewall and anti-virus measures, with appropriate monitoring in place. 5.5 Where remote access is provisioned, controls must be implemented to ensure only authorised devices access IT systems and resilient to brute force attacks. 5.6 The Applicant Institution shall take all reasonable measures to ensure that vulnerabilities are discovered and addressed within a reasonable time frame. These measures could include internal vulnerability scanning and the use of independent external auditors (penetration testing).

Appears in 2 contracts

Sources: Material Transfer Agreement, Material Transfer Agreement

Technical Controls. 5.1 The Applicant Collaborator Institution shall implement appropriate end point security, including firewall, anti-virus, anti-spyware and other anti-malware software and technologies on all laptops, desktops and servers it uses to process the Materials. 5.2 The Applicant Collaborator Institution shall update its firewall, anti-virus, anti-spyware and other anti-malware software and technologies on a regular basis to ensure that they protect against then-current virus, spyware and other malware threats. 5.3 The Applicant Collaborator Institution shall ensure that updates and patches of critical software and firmware are applied within a reasonably prompt time period. 5.4 The Applicant Collaborator Institution shall mitigate external attacks using a number of methods, including the use of Intrusion Prevention and Detection Systems (IPS/IDS) in addition to firewall and anti-virus measures, with appropriate monitoring in place. 5.5 Where remote access is provisioned, controls must be implemented to ensure only authorised devices access IT systems and resilient to brute force attacks. 5.6 The Applicant Collaborator Institution shall take all reasonable measures to ensure that vulnerabilities are discovered and addressed within a reasonable time frame. These measures could include internal vulnerability scanning and the use of independent external auditors (penetration testing).

Appears in 2 contracts

Sources: Material Transfer Agreement, Material Transfer Agreement